Throughout the day, the update will trickle down to mozilla.org/firefox and then the Fully Localized Versions Web page. It should also be pushed as an automatic update to all Firefox users, including those on Firefox 15.0.1 and Firefox 16, as well as older versions. After Mozilla pulled the installers for Firefox 16 yesterday, all Firefox users were being upgraded to Firefox 15.0.1 (unless they already had Firefox 16, in which case they were told to install Firefox 15.0.1 manually).

Let's recap the timeline of events. Firefox 16 was released on Monday and officially launched on Tuesday. On Wednesday, Mozilla revealed the latest version of its browser had a security hole, described by the company as a flaw that could allow a malicious site to potentially determine which websites users have visited by accessing URL parameters.

"he hack at the Northwest Florida State College is believed to be a job by professional outside hackers"

An information breach at a Florida college has compromised information of about 279,000 students and employees, the Florida Department of Education said on Wednesday.

In a statement earlier on Monday, Northwest Florida State College in Niceville said a breach in the security of the college's computer systems had compromised the personal information of some 3,200 current and retired college employees.

The employee data was breached between May 21 to Sept. 24 by outsiders, and the personal information of employees that was compromised included name, birth date, employee direct deposit bank routing and account number information, and Social Security number, the college said.

News broke over the weekend in Japan that police had arrested three people over the past few months in relation to death threats being posted on bulletin boards and sent through email. However, it was also reported that the suspects were subsequently released without charge due to the discovery of a particular malware infection on all of the suspect's computers that is believed to have been used to make the threats. Examples of some of the threats include a posting to a government website stating that the person posting the threat will commit mass murder in a popular shopping area; a posting to an Internet forum saying that he/she will blow up a famous shrine; an email sent to an airline company threatening to use a bomb to destroy an aircraft; and an email threatening the kindergarten where a child of the royal family attends. Police are currently investigating the connection between the threats and the malware.

From our analysis, we have confirmed that the malware is capable of controlling a compromised computer from a remote location, which is not anything new to malware. Furthermore, from the various functions we have confirmed, the creator has the capability to command the malware to make the threats mentioned above. We have also discovered that a string of characters used to process encrypted communication with the creator is in Japanese and the code is taken from a Japanese website. Therefore, we believe the creator is most likely a person who has a good understanding of the Japanese language.

Google has awarded $60,000 to a security researcher who cracked Chrome at the search firm's second "Pwnium" hacking contest.

The researcher, a teenager who goes by the nickname "Pinkie Pie," was a returning winner: Last March, he was one of two who each won $60,000 for hacking the Chrome browser at Google's inaugural challenge.

Pwnium 2 took place at the Hack In The Box security conference this week in Kuala Lumpur, Malaysia. Google made news two months ago when it announced the follow-up contest, saying then that it would put as much as $2 million on the line.

" At Hack In The Box researcher Felix "FX" Lindner has shown how Huawei routers are easy to access with their static passwords and how one machine could give an attacker access to an entire network."

Researcher Felix "FX" Lindner has just revealed to attendees of his talk at security conference Hack In The Box how easy it is to gain access to Huawei routers and telco equipment, spelling out how backdoor access is not necessary if an attacker wants to get in and access traffic that runs through them.

He told the packed room in Kuala Lumpur, "I don't know if there are backdoors - but it doesn't matter since there are so many vulnerabilities."

Lindner showed that code running the routers - used by billions worldwide - is shockingly dated and riddled with security holes. While he says he has not found any new vulnerabilities per se, he says he has discovered some revelatory "special features."

These "special features" include the telco's bootloader protection - where one would set a password to protect against loading new software.

Since the beginning of October we have seen a variant of fake antivirus malware that belongs to the FakeRean family of rogue security products. FakeRean is distributed by drive-by downloads or is dropped and executed by another malware. It blocks victims from accessing any other legitimate application on an infected machine. Like other fake AV products, it claims to detect infections and displays alerts to scare users into purchasing "protection." In reality this program does not scan your computer. These rogue malware extort money from PC owners to "fix" their systems. This malware also blocks users from accessing or executing any .exe file on the victim's machine.

The main difference with this rogue is that it brings up a different GUI depending on the version of Windows it infects.

"Facebook prevents the abuse of phone number searching on its mobile site by imposing a search-rate limit"

Facebook has restricted the rate at which users can perform phone number searches on its mobile website in order to block a recently disclosed method of harvesting phone numbers.

"The ability to search for a person by phone number is intentional behaviour and not a bug in Facebook," Facebook said Tuesday in an emailed statement. "By default, your privacy settings allow everyone to find you with search and friend finder using the contact info you have provided, such as your email address and phone number. You can modify these settings at any time from the Privacy Settings page."

"Facebook has developed an extensive system for preventing the malicious usage of our search functionality and the scenario described by the researcher was indeed rate-limited and eventually blocked," the company said. "We are constantly updating these systems to improve their effectiveness and address new kinds of attacks."

On Friday, independent security researcher Suriya Prakash publicly disclosed that Facebook's phone number search feature can be abused to find the name of people who own randomly generated phone numbers.

Emails have been spammed out by cybercriminals, posing as messages from Skype, claiming that you have changed your password on the service.

Here's an example of one such email (click on it for a larger version): [Screenshot]

If you look carefully, you may spot that the spammers made a clumsy spelling mistake:

'Password successfully changed Your new Skype password has been set.

You can now view your attached call history and inscturtions how to change your account settings. If the changes described above are accurate, no further action is needed. If anything doesn't look right, follow the link below to make changes: Restore password Talk soon, The people at Skype'

Perhaps surprisingly, the links really do point to the genuine Skype website at skype.com.

If you believe this post is offensive or violates the CNET Forums' Usage policies, you can report it below (this will not automatically remove the post). Once reported, our moderators will be notified and the post will be reviewed.

Track this thread and email me when there are updates.Please read before posting

If you're asking for technical help, please be sure to include all your system info, including operating system, model number, and any other specifics related to the problem. Also please exercise your best judgment when posting in the forums--revealing personal information such as your e-mail address, telephone number, and address is not recommended.

Old Thread Warning!

This thread is more than days old. It is very likely that it does not need any further discussion and replying to it will serve no purpose. However, if you feel it is necessary to make a new reply, you can still do so.

I am aware that this thread is old, but I still want to post a reply.

Checkbox must be checked in order to post in this old thread.

Sorry, there was a problem submitting your post. Please try again.

Sorry, there was a problem generating the preview. Please try again.

Duplicate posts are not allowed in the forums. Please edit your post and submit again.